User profiles for Gabriel Lim

Gabriel Lim

PhD Researcher, University of East London
Verified email at uel.ac.uk
Cited by 8

[HTML][HTML] Post-radioembolization yttrium-90 PET/CT-part 2: dose-response and tumor predictive dosimetry for resin microspheres

YH Kao, JD Steinberg, YS Tay, GKY Lim, J Yan… - EJNMMI research, 2013 - Springer
Background Coincidence imaging of low-abundance yttrium-90 ( 90 Y) internal pair
production by positron emission tomography with integrated computed tomography (PET/CT) …

[HTML][HTML] Post-radioembolization yttrium-90 PET/CT-part 1: diagnostic reporting

YH Kao, JD Steinberg, YS Tay, GKY Lim, J Yan… - EJNMMI research, 2013 - Springer
Background Yttrium-90 ( 90 Y) positron emission tomography with integrated computed
tomography (PET/CT) represents a technological leap from 90 Y bremsstrahlung single-photon …

Understanding spatial resolution of laser voltage imaging

VK Ravikumar, G Lim, JM Chin, KL Pey… - Microelectronics …, 2018 - Elsevier
Laser voltage imaging (LVI) is a commonly used electrical fault isolation technique that is
extremely useful in the localization of defects in serial chains and circuits generating specific …

[PDF][PDF] Chilling Legislation: Tracking the Impact of 'Fake News' Laws on Press Freedom Internationally

G Lim, S Bradshaw - Center for International Media Assistance, 2023 - skeyesmedia.org
The spread of misinformation, disinformation, and mal-information (MDM) online has
become one of the most pressing issues of our time. Around the world, people have been …

[PDF][PDF] Securitize/Counter-Securitize

G Lim - Data & Society Research Institute, 2020 - datasociety.net
Gabrielle LimLim Kit Siang, a longtime leader of the Democratic Action Party (DAP) and
current member of Parliament, for example, was detained without trial in 1969 and again in …

Burned after reading: endless Mayfly's ephemeral disinformation campaign

G Lim, E Maynier, J Scott-Railton, A Fittarelli, N Moran… - 2019 - tspace.library.utoronto.ca
Endless Mayfly is an Iran-aligned network of inauthentic websites and online personas used
to spread false and divisive information primarily targeting Saudi Arabia, the United States, …

Entanglements and exploits: Sociotechnical security as an analytic framework

M Goerzen, EA Watkins, G Lim - 9th USENIX Workshop on Free and …, 2019 - usenix.org
The rise of social media platforms has produced novel security threats and vulnerabilities.
Malicious actors can now exploit entanglements of once disparate technical and social …

Pattern search automation for combinational logic analysis

…, SY Xuan, L Gabriel… - … for Testing and …, 2018 - dl.asminternational.org
Combinational logic analysis (CLA) using laser voltage probing allows studying standard
cells such as NOR or NAND gates as a whole, instead of individual transistors. The process …

Suspended sand concentration models under breaking waves: Evaluation of new and existing formulations

G Lim, R Jayaratne, T Shibayama - Marine Geology, 2020 - Elsevier
A total of 7 reference concentration (C 0 ) models (6 existing and 1 newly proposed) were
validated against 119 test cases from 4 recently published datasets collected under the LIP, …

[PDF][PDF] Space invaders: The networked terrain of zoom bombing

B Friedberg, G Lim, J Donovan - Technology and Social …, 2020 - mediamanipulation.org
Within days of the virtual meeting platform Zoom becoming a household name, news spread
that meetings were being hijacked by uninvited guests. The practice was quickly dubbed …